logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma

http_signatures.ex (2993B)


      1 # Pleroma: A lightweight social networking server
      2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
      3 # SPDX-License-Identifier: AGPL-3.0-only
      4 
      5 # https://tools.ietf.org/html/draft-cavage-http-signatures-08
      6 defmodule Pleroma.Web.HTTPSignatures do
      7   alias Pleroma.User
      8   alias Pleroma.Web.ActivityPub.ActivityPub
      9   alias Pleroma.Web.ActivityPub.Utils
     10 
     11   require Logger
     12 
     13   def split_signature(sig) do
     14     default = %{"headers" => "date"}
     15 
     16     sig =
     17       sig
     18       |> String.trim()
     19       |> String.split(",")
     20       |> Enum.reduce(default, fn part, acc ->
     21         [key | rest] = String.split(part, "=")
     22         value = Enum.join(rest, "=")
     23         Map.put(acc, key, String.trim(value, "\""))
     24       end)
     25 
     26     Map.put(sig, "headers", String.split(sig["headers"], ~r/\s/))
     27   end
     28 
     29   def validate(headers, signature, public_key) do
     30     sigstring = build_signing_string(headers, signature["headers"])
     31     Logger.debug("Signature: #{signature["signature"]}")
     32     Logger.debug("Sigstring: #{sigstring}")
     33     {:ok, sig} = Base.decode64(signature["signature"])
     34     :public_key.verify(sigstring, :sha256, sig, public_key)
     35   end
     36 
     37   def validate_conn(conn) do
     38     # TODO: How to get the right key and see if it is actually valid for that request.
     39     # For now, fetch the key for the actor.
     40     with actor_id <- Utils.get_ap_id(conn.params["actor"]),
     41          {:ok, public_key} <- User.get_public_key_for_ap_id(actor_id) do
     42       if validate_conn(conn, public_key) do
     43         true
     44       else
     45         Logger.debug("Could not validate, re-fetching user and trying one more time")
     46         # Fetch user anew and try one more time
     47         with actor_id <- Utils.get_ap_id(conn.params["actor"]),
     48              {:ok, _user} <- ActivityPub.make_user_from_ap_id(actor_id),
     49              {:ok, public_key} <- User.get_public_key_for_ap_id(actor_id) do
     50           validate_conn(conn, public_key)
     51         end
     52       end
     53     else
     54       _e ->
     55         Logger.debug("Could not public key!")
     56         false
     57     end
     58   end
     59 
     60   def validate_conn(conn, public_key) do
     61     headers = Enum.into(conn.req_headers, %{})
     62     signature = split_signature(headers["signature"])
     63     validate(headers, signature, public_key)
     64   end
     65 
     66   def build_signing_string(headers, used_headers) do
     67     used_headers
     68     |> Enum.map(fn header -> "#{header}: #{headers[header]}" end)
     69     |> Enum.join("\n")
     70   end
     71 
     72   def sign(user, headers) do
     73     with {:ok, %{info: %{keys: keys}}} <- Pleroma.Web.WebFinger.ensure_keys_present(user),
     74          {:ok, private_key, _} = Pleroma.Web.Salmon.keys_from_pem(keys) do
     75       sigstring = build_signing_string(headers, Map.keys(headers))
     76 
     77       signature =
     78         :public_key.sign(sigstring, :sha256, private_key)
     79         |> Base.encode64()
     80 
     81       [
     82         keyId: user.ap_id <> "#main-key",
     83         algorithm: "rsa-sha256",
     84         headers: Map.keys(headers) |> Enum.join(" "),
     85         signature: signature
     86       ]
     87       |> Enum.map(fn {k, v} -> "#{k}=\"#{v}\"" end)
     88       |> Enum.join(",")
     89     end
     90   end
     91 end